Security

Security | News, how-tos, features, reviews, and videos

Multiple-exposure shot of a clock and calendar pages. [time / past / future / history / what's next]
conference / convention / audience / applause / clapping

cybersecurity controls

14 controls for securing SAP systems in the cloud

Organizations often don't follow security best practices when deploying and managing complex SAP systems. This set of security controls from the Cloud Security Alliance aims to change that.

human weak link cybersecurity primary

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

doxing thumb
video

What is doxing?

Doxing is the practice of posting someone's personal information online without their consent. Doxers aim to reveal information that can move their conflict with their targets from the internet to the real world, including home...

CSO Executive Sessions [podcast logo]

Episode 14: How COVID-19 changed security priorities at Bristol Myers Squibb

Jerry Roberts, director of corporate security at Bristol Myers Squibb, joins host Bob Bragdon for a wide-ranging discussion on COVID-19's impact on security, the greatest cybersecurity challenges today, and how Roberts's 20-year...

Microsoft Windows update cycle arrows with overlay a laptop and mobile phone.

Windows 10 security: Are you on the right version?

If you're running an older version of Windows 10, It's time to review security enhancements that later versions offer to see if you need to update.

cssg 079 thumb
video

Windows 10 security: Are you on the right version?

With some versions of Windows 10 off support or going off support soon, it’s time to review what security features you’re missing if you haven’t updated recently. Follow along here with the full Microsoft Ignite presentation,...

Strategic world map to certification in a binary world.

CISM certification guide: Requirements, prerequisites, and cost

Certified Information Security Manager, or CISM, is a certification for advanced IT professionals who want to demonstrate that they can develop and manage an infosec program at the enterprise level.

A broken link in a digital chaing / weakness / vulnerability

The Windows Bad Neighbor vulnerability explained — and how to protect your network

Attackers could use the Windows Bad Neighbor vulnerability to perform remote code execution or create buffer overflows. Patches and workarounds are available.

mentor teach learn office computer

7 steps to ensure a successful CISO transition

CISOs can play a critical role transitioning their replacements to the job and build a great reputation in the process. Follow this advice to ensure security operations don't miss a beat.

Conceptual image of executives; silhouettes in motion with a virtual global network overlay.

Why CISOs must be students of the business

Technical expertise will only get you so far. To earn a seat at the executive table, today's CISOs need to understand their business.

gavel / abstract binary lines  >  court judgment / fine / penalty / settlement

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.2 billion and counting.

many keys on a series of keychains / key rings / binary code overlay / password management

The 6 best password managers

Look to these top password managers for Windows, MacOS, iOS and Android to make your online life easier and more secure.

Ransomware  >  A masked criminal ransoms data for payment.

US Treasury Department ban on ransomware payments puts victims in tough position

The Treasury Department's advisory warns companies not to pay ransoms to sanctioned entities. The move complicates ransomware incident response and might encourage insurance carriers to drop ransomware coverage.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

The 4 pillars of Windows network security

Microsoft's CISO breaks down which four key areas to focus on to secure Windows networks: passwordless identity management, patch management, device control and benchmarks.

video conferencing / remote work

8 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs?

cssg 078 thumb
video

The four pillars of Windows network security

Multi-factor authentication, strong patch management, device control, and adherence to security benchmarks go a long way to protecting your Windows network.

Russian hammer and sickle / binary code

US DOJ indictments might force Russian hacker group Sandworm to retool

Experts hope that indictments against six Russian military intelligence agents will make Russia rethink plans to disrupt the US election.

Data breach  >  open padlock allowing illicit streaming data collection

Avoiding the snags and snares in data breach reporting: What CISOs need to know

Ambiguities in a growing list of US reporting requirements keep CISOs up at night: Will they be compelled to report every breach even if they can prove the data was untouched? Experts advise on how to avoid trouble.

Load More